200-125 Premium Bundle

200-125 Premium Bundle

CCNA Cisco Certified Network Associate CCNA (v3.0) Certification Exam

4.5 
(35505 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 23, 2024Last update

Cisco 200-125 Free Practice Questions

Q1.  - (Topic 8)

Which feature can you implement to reserve bandwidth for VoIP calls across the call path?

A. PQ

B. CBWFQ

C. round robin

D. RSVP

Answer: D

Q2.  - (Topic 8)

Which action can change the order of entries in a named access list?

A. opening the access list in Notepad.

B. resequercing

C. removing an entry

D. adding an entry

Answer: B

Q3.  - (Topic 3)

Refer to the exhibit.

C-router is to be used as a "router-on-a-stick" to route between the VLANs. All the interfaces have been properly configured and IP routing is operational. The hosts in the VLANs have been configured with the appropriate default gateway. What is true about this configuration?

A. These commands need to be added to the configuration: C-router(config)# router eigrp 123

C-router(config-router)# network 172.19.0.0

B. These commands need to be added to the configuration: C-router(config)# router ospf 1

C-router(config-router)# network 172.19.0.0 0.0.3.255 area 0

C. These commands need to be added to the configuration: C-router(config)# router rip

C-router(config-router)# network 172.19.0.0

D. No further routing configuration is required.

Answer: D

Explanation:

Since all the same router (C-router) is the default gateway for all three VLANs, all traffic destined to a different VLA will be sent to the C-router. The C-router will have knowledge of all three networks since they will appear as directly connected in the routing table. Since the C-router already knows how to get to all three networks, no routing protocols need to be configured.

Q4.  - (Topic 6)

Refer to the exhibit.

An attempt to deny web access to a subnet blocks all traffic from the subnet. Which interface command immediately removes the effect of ACL 102?

A. no ip access-class 102 in

B. no ip access-class 102 out

C. no ip access-group 102 in

D. no ip access-group 102 out

E. no ip access-list 102 in

Answer: D

Explanation:

The “ip access-group” is used to apply and ACL to an interface. From the output shown, we know that the ACL is applied to outbound traffic, so “no ip access-group 102 out” will

remove the effect of this ACL.

Q5.  - (Topic 8)

What is the danger of the permit any entry in a NAT access list?

A. It can lead to overloaded resources on the router.

B. It can cause too many addresses to be assigned to the same interface.

C. It can disable the overload command.

D. It prevents the correct translation of IP addresses on the inside network.

Answer: A

Q6.  - (Topic 8)

Which standards-based First Hop Redundancy Protocol is a Cisco supported alternative to Hot Standby Router Protocol?

A. VRRP

B. GLBP

C. TFTP

D. DHCP

Answer: A

Q7.  - (Topic 4)

Which two statements about using the CHAP authentication mechanism in a PPP link are true? (Choose two.)

A. CHAP uses a two-way handshake.

B. CHAP uses a three-way handshake.

C. CHAP authentication periodically occurs after link establishment.

D. CHAP authentication passwords are sent in plaintext.

E. CHAP authentication is performed only upon link establishment.

F. CHAP has no protection from playback attacks.

Answer: B,C

Explanation:

CHAP is an authentication scheme used by Point to Point Protocol (PPP) servers to validate the identity of remote clients. CHAP periodically verifies the identity of the client by using a three-way handshake. This happens at the time of establishing the initial link (LCP), and may happen again at any time afterwards. The verification is based on a shared secret (such as the client user's password).

Q8.  - (Topic 4)

RouterA is unable to reach RouterB. Both routers are running IOS version 12.0.

After reviewing the command output and graphic, what is the most likely cause of the problem?

A. incorrect bandwidth configuration

B. incorrect LMI configuration

C. incorrect map statement

D. incorrect IP address

Answer: C

Explanation:

First we have to say this is an unclear question and it is wrong. The “frame-relay map ip” statement is correct thus none of the four answers above is correct. But we guess there is a typo in the output. Maybe the “ip address 172.16.100.2 255.255.0.0 command should be “ip address 172.16.100.1 255.255.0.0. That makes answer C correct.

Q9.  - (Topic 5)

Refer to the exhibit.

Which rule does the DHCP server use when there is an IP address conflict?

A. The address is removed from the pool until the conflict is resolved.

B. The address remains in the pool until the conflict is resolved.

C. Only the IP detected by Gratuitous ARP is removed from the pool.

D. Only the IP detected by Ping is removed from the pool.

E. The IP will be shown, even after the conflict is resolved.

Answer: A

Explanation:

An address conflict occurs when two hosts use the same IP address. During address assignment, DHCP checks for conflicts using ping and gratuitous ARP. If a conflict is detected, the address is removed from the pool. The address will not be assigned until the administrator resolves the conflict.

(Reference: http://www.cisco.com/en/US/docs/ios/12_1/iproute/configuration/guide/1cddhcp.html)

Q10.  - (Topic 8)

Which statement about named ACLs is true?

A. They support standard and extended ACLs.

B. They are used to filter usernames and passwords for Telnet and SSH.

C. They are used to filter Layer 7 traffic.

D. They support standard ACLs only.

E. They are used to rate limit traffic destined to targeted networks.

Answer: A

Explanation:

Named Access Control Lists (ACLs) allows standard and extended ACLs to be given names instead of numbers. Unlike in numbered Access Control Lists (ACLs), we can edit Named Access Control Lists. Another benefit of using named access configuration mode is that you can add new statements to the access list, and insert them wherever you like. With the legacy syntax, you must delete the entire access list before reapplying it using the updated rules.

Q11.  - (Topic 8)

How does a router handle an incoming packet whose destination network is missing from the routing table?

A. it discards the packet.

B. it broadcasts the packet to each network on the router.

C. it routes the packet to the default route.

D. it broadcasts the packet to each interface on the router.

Answer: A

Q12.  - (Topic 8)

Which technology allows a large number of private IP addresses to be represented by a smaller number of public IP addresses?

A. NAT

B. NTP

C. RFC 1631

D. RFC 1918

Answer: A

Q13.  - (Topic 7)

What command visualizes the general NetFlow data on the command line?

A. show ip flow export

B. show ip flow top-talkers

C. show ip cache flow

D. show mls sampling

E. show mls netflow ip

Answer: C

Explanation:

The following is an example of how to visualize the NetFlow data using the CLI. There are three methods to visualize the data depending on the version of Cisco IOS Software. The traditional show command for NetFlow is "show ip cache flow" also available are two forms of top talker commands. One of the top talkers commands uses a static configuration to view top talkers in the network and another command called dynamic top talkers allows real-time sorting and aggregation of NetFlow data. Also shown is a show MLS command to view the hardware cache on the Cisco Catalyst 6500 Series Switch.

The following is the original NetFlow show command used for many years in Cisco IOS Software. Information provided includes packet size distribution; basic statistics about number of flows and export timer setting, a view of the protocol distribution statistics and the NetFlow cache.

The “show ip cache flow” command displays a summary of the NetFlow accounting statistics.

Reference: http://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/ios-netflow/prod_white_paper0900aecd80406232.html

Q14.  - (Topic 5)

Which three statements about Syslog utilization are true? (Choose three.)

A. Utilizing Syslog improves network performance.

B. The Syslog server automatically notifies the network administrator of network problems.

C. A Syslog server provides the storage space necessary to store log files without using router disk space.

D. There are more Syslog messages available within Cisco IOS than there are comparable SNMP trap messages.

E. Enabling Syslog on a router automatically enables NTP for accurate time stamping.

F. A Syslog server helps in aggregation of logs and alerts.

Answer: C,D,F

Explanation:

The Syslog sender sends a small (less than 1KB) text message to the Syslog receiver. The Syslog receiver is commonly called "syslogd," "Syslog daemon," or "Syslog server." Syslog messages can be sent via UDP (port 514) and/or TCP (typically, port 5000). While there are some exceptions, such as SSL wrappers, this data is typically sent in clear text over the network. A Syslog server provides the storage space necessary to store log files without using router disk space.

In general, there are significantly more Syslog messages available within IOS as compared to SNMP Trap messages. For example, a Cisco Catalyst 6500 switch running Cisco IOS Software Release 12.2(18)SXF contains about 90 SNMP trap notification messages, but has more than 6000 Syslog event messages.

System logging is a method of collecting messages from devices to a server running a syslog daemon. Logging to a central syslog server helps in aggregation of logs and alerts. Cisco devices can send their log messages to a UNIX-style syslog service. A syslog service accepts messages and stores them in files, or prints them according to a simple configuration file.

Reference: http://www.cisco.com/c/en/us/products/collateral/services/high-availability/white_paper_c11-557812.html

Q15.  - (Topic 4)

A network administrator needs to configure a serial link between the main office and a remote location. The router at the remote office is a non-Cisco router. How should the network administrator configure the serial interface of the main office router to make the connection?

A. Main(config)# interface serial 0/0

Main(config-if)# ip address 172.16.1.1 255.255.255.252 Main(config-if)# no shut

B. Main(config)# interface serial 0/0

Main(config-if)# ip address 172.16.1.1 255.255.255.252 Main(config-if)# encapsulation ppp

Main(config-if)# no shut

C. Main(config)# interface serial 0/0

Main(config-if)# ip address 172.16.1.1 255.255.255.252 Main(config-if)# encapsulation frame-relay

Main(config-if)# authentication chap Main(config-if)# no shut

D. Main(config)# interface serial 0/0

Main(config-if)#ip address 172.16.1.1 255.255.255.252 Main(config-if)#encapsulation ietf

Main(config-if)# no shut

Answer: B

Explanation:

With serial point to point links there are two options for the encapsulation. The default, HDLC, is Cisco proprietary and works only with other Cisco routers. The other option is PPP which is standards based and supported by all vendors.

START 200-125 EXAM